Top 250+ Solved Computer Architecture and Organization MCQ Questions Answer
Q. Most packet switches use this principle
a. stop and wait
b. store and forward
c. store and wait
d. stop and forward
Q. What are the Methods to move data through a network of links and switches?
a. packet switching and line switching
b. circuit switching and line switching
c. line switching and bit switching
d. packet switching and circuit switching
Q. The required resources for communication between end systems are reserved for the duration of the session between end systems in method.
a. packet switching
b. circuit switching
c. line switching
d. frequency switching
Q. As the resources are reserved between two communicating end systems in circuit switching, is achieved.
a. authentication
b. guaranteed constant rate
c. reliability
d. store and forward
Q. In systems, resources are allocated on demand.
a. packet switching
b. circuit switching
c. line switching
d. frequency switching
Q. Which of the following is not an application layer service?
a. network virtual terminal
b. file transfer, access, and management
c. mail service
d. error control
Q. Which of the following is not applicable for IP?
a. error reporting
b. handle addressing conventions
c. datagram format
d. packet handling conventions
Q. Which of the following field in IPv4 datagram is not related to fragmentation?
a. flags
b. offset
c. tos
d. identifier
Q. The TTL field has value 10. How many routers (max) can process this datagram?
a. 11
b. 5
c. 10
d. 1
Q. If the value in protocol field is 17, the transport layer protocol used is
a. tcp
b. udp
c. icmp
d. igmp
Q. The data field cannot carry which of the following?
a. tcp segment
b. udp segment
c. icmp messages
d. smtp messages
Q. What should be the flag value to indicate the last fragment?
a. 0
b. 1
c. ttl value
d. protocol field value
Q. Which of these is not applicable for IP protocol?
a. is connectionless
b. offer reliable service
c. offer unreliable service
d. does not offer error reporting
Q. Which of the following demerits does Fragmentation have?
a. complicates routers
b. open to dos attack
c. overlapping of fragments.
d. all of the mentioned